top of page
perceptive_background_267k.jpg

JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized input th…

Published:

27 maart 2026 om 23:00:00

Alert date:

28 maart 2026 om 13:07:27

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

JAD version 1.5.8e-1kali1 and prior versions contain a critical stack-based buffer overflow vulnerability (CVE-2016-20049) that enables remote code execution. Attackers can exploit this flaw by providing malicious input strings exceeding 8150 bytes, which overflow the stack buffer and overwrite return addresses. This allows attackers to execute arbitrary shellcode within the application context. The vulnerability affects the Java decompiler JAD and has publicly available exploit code. Organizations using affected versions should upgrade immediately to prevent potential compromise.

Technical details

Mitigation steps:

Affected products:

JAD

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page